EP1350253B1 - Method for dual bit memory erase verification - Google Patents
Method for dual bit memory erase verification Download PDFInfo
- Publication number
- EP1350253B1 EP1350253B1 EP01961964A EP01961964A EP1350253B1 EP 1350253 B1 EP1350253 B1 EP 1350253B1 EP 01961964 A EP01961964 A EP 01961964A EP 01961964 A EP01961964 A EP 01961964A EP 1350253 B1 EP1350253 B1 EP 1350253B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- bit
- properly erased
- dual
- cell
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/34—Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
- G11C16/3436—Arrangements for verifying correct programming or erasure
- G11C16/344—Arrangements for verifying correct erasure or for detecting overerased cells
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C11/00—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
- G11C11/56—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency
- G11C11/5671—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency using charge trapping in an insulator
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/04—Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS
- G11C16/0466—Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS comprising cells with charge storage in an insulating layer, e.g. metal-nitride-oxide-silicon [MNOS], silicon-oxide-nitride-oxide-silicon [SONOS]
- G11C16/0475—Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS comprising cells with charge storage in an insulating layer, e.g. metal-nitride-oxide-silicon [MNOS], silicon-oxide-nitride-oxide-silicon [SONOS] comprising two or more independent storage sites which store independent data
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/34—Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
- G11C16/3436—Arrangements for verifying correct programming or erasure
- G11C16/344—Arrangements for verifying correct erasure or for detecting overerased cells
- G11C16/3445—Circuits or methods to verify correct erasure of nonvolatile memory cells
Definitions
- the present invention relates generally to memory systems and in particular to a method for verifying erasure of sectors of bits in electronic memory devices.
- Flash memory is a type of electronic memory media which can be rewritten and hold its content without power. Flash memory devices generally have life spans from 100K to 300K write cycles. Unlike dynamic random access memory (DRAM) and static random access memory (SRAM) memory chips, in which a single byte can be erased, flash memory is typically erased and written in fixed multi-bit blocks or sectors. Evolving out of electrically erasable read only memory (EEPROM) chip technology, which can be erased in place, flash memory is less expensive and more dense. This new category of EEPROMs has emerged as an important nonvolatile memory which combines the advantages of EPROM density with EEPROM electrical erasability.
- DRAM dynamic random access memory
- SRAM static random access memory
- each cell typically includes a metal oxide semiconductor (MOS) transistor structure having a source, a drain, and a channel in a substrate or P-well, as well as a stacked gate structure overlying the channel.
- MOS metal oxide semiconductor
- the stacked gate may further include a thin gate dielectric layer (sometimes referred to as a tunnel oxide) formed on the surface of the P-well.
- the stacked gate also includes a polysilicon floating gate overlying the tunnel oxide and an interpoly dielectric layer overlying the floating gate.
- the interpoly dielectric layer is often a multilayer insulator such as an oxide-nitride-oxide (ONO) layer having two oxide layers sandwiching a nitride layer.
- ONO oxide-nitride-oxide
- a polysilicon control gate overlies the interpoly dielectric layer.
- the control gate is connected to a word line associated with a row of such cells to form sectors of such cells in a typical NOR configuration.
- the drain regions of the cells are connected together by a conductive bit line.
- the channel of the cell conducts current between the source and the drain in accordance with an electric field developed in the channel by the stacked gate structure.
- each drain terminal of the transistors within a single column is connected to the same bit line.
- each flash cell has its stacked gate terminal coupled to a different word line, while all the flash cells in the array have their source terminals coupled to a common source terminal.
- individual flash cells are addressed via the respective bit line and word line using peripheral decoder and control circuitry for programming (writing), reading or erasing functions.
- Such a single bit stacked gate flash memory cell is programmed by applying a relatively high voltage to the control gate and connecting the source to ground and the drain to a predetermined potential above the source.
- a resulting high electric field across the tunnel oxide leads to a phenomena called "Fowler-Nordheim" tunneling.
- electrons in the core cell channel region tunnel through the gate oxide into the floating gate and become trapped in the floating gate since the floating gate is surrounded by the interpoly dielectric and the tunnel oxide.
- the threshold voltage of the cell increases. This change in the threshold voltage (and thereby the channel conductance) of the cell created by the trapped electrons is what causes the cell to be programmed.
- an erase verification is performed to determine whether each cell in a block or set of such cells has been properly erased.
- Current single bit erase verification methodologies provide for verification of bit or cell erasure, and application of supplemental erase pulses to individual cclls which fail the initial verification. Thereafter, the erased status of the cell is again verified, and the process continues until the cell or bit is successfully erased or the cell is marked as unusable.
- WO97/48098 discloses an array of multilevel memory cells in which the state of bit latches is sensed to determine the threshold voltages of the memory cells.
- US 6,011,725 discloses a read only memory capable of storing two bits of information, which includes a method of programming, reading and erasing the two bit device.
- a method according to claim 1 is provided which overcomes or minimizes the problems and shortcomings of conventional memory cell erasure verification schemes.
- the invention is a method for verifying erasure of one or more dual bit cells in a memory device, such as a flash memory.
- the invention allows for efficient and thorough erasure verification, which minimizes data retention and over-erase issues particular to the dual bit cell architecture.
- the invention provides significant advantages when employed in association with dual bit memory cells wherein only one bit thereof is actively used for data storage. However, it will be recognized that the invention finds utility in association with dual bit memory cell architectures generally, and that the invention is thus not limited to any particular dual bit cell usage implementation or configuration.
- the invention provides methodologies and a system for verifying proper erasure of one or more dual bit memory cells, and may be used in conjunction with a chip erase or sector erase operation in a flash memory device. For example, a sector erase or preprogramming operation may be performed in order to apply erase pulses to each such cell in a flash memory device. Thereafter, the invention may be employed in order to verify which cells in the device have been properly erased.
- the invention selectively attempts to re-erase cells (e.g ., via selective application of erase voltage pulses to one or both individual bits in a dual bit memory cell) which have not been properly erased in the preprogramming operation.
- the invention also provides for selective re-verification of proper erasure of one or both bits in a dual bit cell.
- Fig. 1 illustrates an exemplary dual bit memory cell 2 in which one or more of the various aspects of the invention may be carried out.
- the memory cell 2 comprises a silicon dioxide layer 3 with buried polysilicon islands (not numerically designated) therein.
- a P-type substrate 4 has buried N+ source 5 and N+ drain 6 regions.
- the silicon dioxide 3 is sandwiched between two layers of silicon dioxide 7, and 8.
- the layer 3 may comprise a silicon nitride or any other form of charge trapping layer.
- the memory cell 2 is capable of storing two data bits, a left bit represented by the dashed circle A and a right bit represented by the dashed circle B.
- the dual bit memory cell 2 is generally symmetrical, thus the drain 6 and the source 5 are interchangeable.
- the left junction 5 may serve as the source terminal and the right junction 6 as the drain terminal with respect to the right bit B.
- the right junction 6 may serve as the source terminal and the left junction 5 as the drain terminal for the left bit A.
- dual bit memory cell architecture may be verified according to one or more aspects of the present invention.
- the invention is applicable to memory devices wherein both bits in the dual bit cells (e.g ., bits A and B of cell 2) are used for data or information storage, as well as those in which only one bit (e.g ., bit A of cell 2) of the dual bit cell is so used.
- the inventors of the present invention have found that even where one bit in such a cell is not used for data storage (e.g ., bit B of cell 2), that programming and/or erasure of the data storage bit ( e.g ., bit A) may cause various physical phenomena to occur in the unused bit ( e.g ., bit B).
- bit A of cell 2 may cause data retention in bit B and vice versa.
- repeated application of erase voltage pulses to bit A may cause over erasure of bit B.
- These phenomena in the unused bit B may in turn cause degradation with respect to the operation of the bit used for data storage (e.g ., the ability to effectively read, write/program, and/or erase bit A).
- the invention addresses these problems with respect to dual bit memory cell technology by selectively verifying, erasing, and re-verifying the individual bits of such memory cells in order to further ensure the proper erasure of the memory cell, for example, in a block or sector erase operation in a flash memory device.
- an exemplary method 22 is illustrated for memory erasure, which may be advantageously employed in association with one or more dual bit flash memory cells (e.g., cell 2 of Fig. 1 ), for example, as part of a sector erase operation.
- the method 22 begins at step 24, after which the first or "A" bit of a dual bit memory cell (e.g ., bit A of cell 2) is verified at step 26.
- the decision step 28 a determination is made as to whether bit A has been properly erased. As illustrated and described in greater detail hereinafter with respect to Fig.
- the erasure verification operations performed at steps 26, 30, and 42, of the method 22, may be carried out via the application of a voltage to the cell and the sensing of a current in the cell.
- a properly erased bit in a memory cell has a lower threshold voltage than that of a programmed bit
- an appropriate voltage between the programmed bit threshold voltage and that of an erased bit may be applied to two terminals of the three terminal memory structure ( e.g ., dual bit memory cell 2 of Fig. 1 ), and the resulting current may be sensed to determine whether the bit has been properly erased.
- bit A has been properly erased at step 28, the method 22 proceeds to step 30, whereat a verification is performed to verify proper erasure of a second bit "B" in the dual bit architecture memory cell.
- bit A Only one bit (e.g ., bit "A") in the dual bit memory cell is used for data storage in the following discussion.
- bit A Only one bit (e.g ., bit "A") in the dual bit memory cell is used for data storage in the following discussion.
- bit "A” only one bit (e.g ., bit "A") in the dual bit memory cell is used for data storage in the following discussion.
- the method may be advantageously employed in association with dual bit memory cells wherein both bits are used for data storage.
- the selective verification of both bits in such a dual bit cell accounts for the possibility of data retention and over-erase conditions in one such bit affecting the operation of the other such bit, and accordingly provides for selective verification and re-erasure of such bits, in order to eliminate or minimize the cross effects of such phenomena.
- step 34 it is determined whether more cells (e.g ., in a multiple cell memory block or sector) need to be verified.
- the method may be selectively employed to verify erasure of a certain number of the cells (e.g ., eight or sixteen), which are connected in a NOR configuration, although other implementations are possible wherein any number of such cells may be serially verified according to the invention.
- step 34 If there are other cells to be verified at decision step 34, the method proceeds to step 36, whereat a cell counter (not shown) may be incremented prior to returning to step 26. Otherwise (e.g ., all such cells have been verified), the method ends at step 38.
- the method 22 ensures against the deleterious cross effects of data retention and/or over-erasure of one bit in a dual bit memory cell with respect to the other such bit, by verifying the proper erasure of both bits in each cell prior to moving on to the next cell at step 36 or ending the process at step 38.
- bit A in the cell has not been properly erased (e.g ., as determined via the bit A verification at step 26)
- the method 22 proceeds to step 40 whereat bit A is erased ( e.g ., via the application of an erase pulse to two terminals of the cell as illustrated and described in greater detail hereinafter).
- bit A is erased (e.g ., via the application of an erase pulse to two terminals of the cell as illustrated and described in greater detail hereinafter).
- the method 22 verifies proper erasure of bit B at step 42 following application of an erase pulse to bit A at step 42.
- bit B will not be subjected to repeated erase pulses on bit A (and the residual effect thereof on bit B) without being itself verified after each application thereof to bit A.
- a decision is accordingly made at step 44 as to whether bit B (e.g ., the second bit in the dual bit memory cell) has been properly erased. If so, the method 22 returns to step 26 for a re-verification of the proper erasure of bit A as described above. Otherwise (bit B is not properly erased), method 22 proceeds to step 46 whereat bit B is again erased ( e.g ., via application of an erase pulse to the cell) before returning to step 26. It will be noted in this regard, that following application of erase pulses to bit B at step 46, bit A is verified immediately thereafter at step 26. This methodology thus prevents repeated application of erase pulses to bit B (and the residual effect thereof on bit A) without bit A being verified after each application thereof to bit B. The method 22, thereby reduces the likelihood of over-erasure of the bits A and B caused during the erase verification.
- bit B is erased at step 46, after which the method 22 returns to step 26.
- the method 22 selectively verifies, re-verifies, erases, and re-erases one or both bits (e.g ., bit "A" and bit "B") of a dual bit memory cell in order to ensure that both bits are properly erased ( e.g ., at step 32) prior to ending at step 38 or proceeding to another such cell at step 36.
- the method 22 may include internal counters or other steps by which a cell may be determined to be unuseable (e.g ., unable to be properly erased) after a number of unsuccessful attempts at erasure/verification, whereby the cell (e.g., or a number of related cells, such as a byte or word) may be marked as bad, or the part itself may hang as part of a failed sector erase operation.
- a cell may be determined to be unuseable (e.g ., unable to be properly erased) after a number of unsuccessful attempts at erasure/verification, whereby the cell (e.g., or a number of related cells, such as a byte or word) may be marked as bad, or the part itself may hang as part of a failed sector erase operation.
- redundancy may be employed to mark a cell or a number of cells as bad, and to provide alternate or redundant storage cells as a replacement, whereby acceptable manufacturing yield may be achieved.
- the method 22 may also be employed in association with a sector or chip erase operation initiated by an end-user, wherein a cell failure may be indicated to the user via the memory device hanging as a result.
- step 52 proper erasure of first and second bits of a dual bit memory cell are verified. If both bits (e.g ., bit "A" and bit "B", are properly erased at decision step 54, the method is finished ( e.g ., with respect to one cell) at step 56. It will be appreciated at this point, that the method 50 may be included within a multiple cell erasure verification routine or method in which another memory cell may be verified following exit from the method 50 via step 56.
- step 54 a determination is made at decision step 58 as to whether the first bit is properly erased. If so, the method proceeds to step 60, whereat the second bit is erased ( e.g ., since the first bit is properly erased, the second must not have been), before the method 50 returns to step 52 where the erasure of both bits is re-verified. If, however, the first bit is not properly erased at step 58, the first bit is then erased at step 62, after which the method 50 returns to step 52.
- the method 50 thus provides selective erasure and verification of one or both bits in a dual bit memory cell, whereby proper erasure thereof is ensured.
- the cross-effects e.g ., over-erasure and/or data retention
- cross-effects e.g ., over-erasure and/or data retention
- an exemplary four phase sector or block erase operation 70 is illustrated beginning at step 72.
- each bit of an array or memory sector is pre-programmed.
- a first erase verify operation is performed to verify proper erasure of each cell in the memory sector.
- a soft-programming operation is performed in order to ensure against over-erasure of cells within the sector.
- a second erase verification is performed with respect to each cell in the memory sector, in order to ensure against possible deleterious effects of the application of soft programming pulses in the third phase at step 78.
- FIG. 5A-5D another exemplary method 100 of memory erasure is illustrated, which may be implemented as part of a multi-phase array or sector erasure operation (e.g ., operation 70 of Fig. 4 ).
- the details of the method 100 will be described herein with respect to the erase phases thereof (e.g ., phases 2 and/or 4 at steps 76 and 80 of operation 70 in Fig. 4 ), while the specifics of the pre-programming and soft-programming phases (e.g ., steps 74 and 78 of operation 70) will be omitted for the sake of brevity.
- the method 100 begins at step 102, after which a pulse counter is reset at step 104.
- the pulse counter is reset for each sector being erased, and is used in the exemplary method 100 to limit the number of times an erase pulse is applied to a cell, after which the cell may be treated as unusable (e.g ., 6000).
- a do-sector flag DOSECT is tested at decision step 106, and if set (true), a latched sector of the memory device is erased and verified as described in greater detail hereinafter. Initially, any sectors which are to be erased may be latched, causing the DOSECT flag to be set.
- An any-erase flag AERS is tested at step 108, which is true if a chip erase or sector erase operation is to be performed, and false if a byte programming operation is to be performed. If AERS is false, the method 100 terminates at step 110.
- a sector address counter is incremented at step 112, which is then compared to a max sector address at decision step 114.
- the designated sectors to be erased are pre-programmed in the first phase of the method 100, the detailed discussion of which is omitted for the sake of brevity.
- Pre-programming proceeds through the various steps of method 100 as illustrated in Figs. 5A-5D , after which the maximum sector address is reached at step 114.
- method 100 continues at decision step 116, where a first_VERIFY flag is tested.
- the first_VERIFY flag is initially false (logic 0) during the preprogramming phase, and is set at step 118 upon completion thereof, after which the method 100 returns to step 102.
- a second_VERIFY flag is set to 0 at step 119.
- the pulse counter is again reset at step 104, and the DOSECT flag is tested at step 106. If true (erasure of at least one memory sector is to be verified), the method 100 proceeds to step 120 of Fig. 5C , whereat an erasure verification pulse or voltage is applied to a memory cell.
- the verification pulse is applied for a minimum time period via wait step 122, after which the proper erasure of the cell bit is tested at step 124.
- the erasure of a bit may be tested by application of a voltage to a memory cell at steps 120 and 122, with a current being sensed at step 124, as described in greater detail hereinafter.
- step 126 the cell bit has been properly erased
- AERS is tested at step 128, and if false (e.g ., byte programming operation being performed), the method terminates at step 110 of Fig. 5A .
- AERS is true (e.g ., sector erase or chip erase enabled)
- the first_VERIFY flag is tested at step 130 (which is true for the first erase verify phase), and the method proceeds to step 132 of Fig. 5B .
- a SIDE_B flag is tested at step 132, which is initially false (logic 0), indicating that side "A" of a dual bit memory cell is being verified ( e.g ., bit A of cell 2 in Fig. 1 ).
- the method does not proceed to step 132. Rather, the byte address is incremented and the pulse counter is reset at step 133, where after decision step 174 tests whether the maximum column address has been reached, as described in greater detail hereinafter.
- step 134 in Fig. 5B , whereat an INCA0 operation is performed (whereby a flag is incremented, which indicates whether side "A" or side "B” is being operated on), in order to change the verification to the "B" side of the dual bit cell.
- the pulse counter is reset at step 134, where after a flag SIDE_B is set to 1, and a flag PASS_ONCE is set to 1 at step 136.
- the PASS_ONCE flag is set to 1 when the. "A" side of a cell has been verified as properly erased, and is reset to 0 whenever an erase pulse is applied to one of the "A” or "B” sides of the cell.
- MATCH true at step 126
- the method 100 increments a byte address counter (INCBA operation) and sets a SIDE_B flag equal to 0 at step 146.
- IOCBA operation a byte address counter
- SIDE_B flag a SIDE_B flag
- the flag PASS_ONCE will be false (logic 0) at decision step 142, after which the method 100 proceeds to step 148 whereat the flag SIDE_B is set to 0, and an INCA0 operation is performed, thus switching back to the other (e.g ., "A") side of the dual bit memory cell.
- a MaxPC flag is tested at step 150 in order to determine whether the pulse counter has reached a maximum value.
- a pulse counter is employed to ensure that the method applies only a certain number of such pulses (e.g ., 6000) in attempting to re-erase a cell failing verification, before the cell is determined to be unuseable and the operation hangs ( e.g ., or otherwise indicates the existence of an unusable cell) at step 152.
- the PASS_ONCE flag is set to 0 at step 154 and decision step 156 determines whether the first_VERIFY is true (method 100 is presently in the first verify phase, indicating that the pre-programming phase has been previously completed). If so, the into_SFPGM flag is tested at step 158. While in the first erase verify phase, this flag is false (logic 0), and the method 100 proceeds to step 160 whereat a need_reverify flag is set, indicating that a cell bit is to be re-verified.
- an erase pulse of a certain time duration is applied to the cell with respect to the cell side or bit, where after the need_reverify flag is tested at step 168. If false (e.g ., indicating that the operation is in either the pre-programming or soft program phase), the method 100 returns to again to step 120 where appropriate pre-programming or soft programming verification is performed via steps 120, 122, 124, and 126, as described above. Otherwise (e.g ., need_reverify is true), the method 100 proceeds to step 170 of Fig. 5A , whereat the need_reverify flag is reset to 0.
- step 172 the pulse counter is reset and an INCAO operation is performed to focus on the other side of the memory cell.
- an erase pulse is applied thereto (e.g ., at steps 164 and 166).
- Method 100 then proceeds back to step 102, and the process is repeated until both sides or bits of a cell are properly verified, or the maximum number of pulses is applied in an attempt to properly erase one or both of the bits, and the method hangs at step 152.
- step 142 when the PASS_ONCE flag is true at step 142 (e.g ., indicating that both the "A" and "B" side bits were successfully verified in succession), an INCAO operation is performed at step 144 ( e.g., to point back to the "A" side), and the pulse counter is reset, after which the byte address is incremented at step 146 and the SIDE_B flag is set to 0. Thereafter, method 100 proceeds at step 174 of Fig. 5C , where it is determined whether the maximum column address (e.g ., the end of a word line) has been reached. If not, the remaining columns in the word are verified as described above. If so, decision step 180 of Fig. 5D determines whether the maximum byte address (e.g ., the last byte of the current sector) has been completed. If not, the remaining bytes in the sector are verified as described above.
- the maximum column address e.g ., the last byte of the current sector
- step 182 If all sector bytes have been verified in the second phase (e.g ., the first erase verify phase), at step 182 (first_VERIFY flag is true), and the second_VERIFY flag is false at step 184, decision step 186 tests the into_SFPGM flag. At this point, the first erase verification phase is complete, and the method proceeds to set the into_SFPGM flag at step 188, whereby the soft programming phase is implemented, the detailed description of which is omitted for the sake of brevity.
- the soft programming phase advantageously verifies and selectively adjusts the threshold voltage of the cell bits, to ensure against possible over-erasure thereof which may have been caused by the application of the erase pulses ( e.g ., at steps 164 and 166) during the first erase verification phase.
- the first_VERIFY flag is false, and thus, that decision step 130 of Fig. 5C accordingly transfers method 100 to step 133, rather than to step 132 of Fig. 5B , whereby the pre-programming phase does not include the alternation between cell sides or bits, as do the erasure verification phases.
- the first_VERIFY flag is set during the soft programming phase, whereby alternation between cell bits or sides is achieved.
- the into_SFPGM flag is found to be true at decision step 186, whereby the second_VERIFY flag is set to 1 at step 190 ( e.g ., indicating that the second erase verification of operation phase 4 is to be performed next) and the into_SFPGM flag is reset to 0 at step 192 ( e.g ., indicating that soft programming has been completed). Thereafter, the method 100 again verifies proper erasure of the designated sector cells via the steps described above.
- the second verify pass (e.g ., wherein the flag second_VERIFY is true) may be employed to ensure that any soft programming pulses applied during the soft programming phase have not inadvertently caused cell bits to fail the erase verification.
- the second erase verification phase proceeds with very few or no verification failures, selectively re-erasing certain bits as the need arises according to the verification steps 120-126.
- the memory cell 200 comprises a silicon dioxide layer 204 with buried polysilicon islands (not numerically designated) therein.
- a P-type substrate 206 has buried N+ source 208 and N+ drain 210 regions.
- the silicon dioxide 204 is sandwiched between two layers of silicon dioxide 212, and 214.
- the layer 204 may comprise a silicon nitride or any other form of charge trapping layer.
- the memory cell 200 is capable of storing two data bits, a right bit represented by the dashed circle 220 and a left bit represented by the dashed circle 222.
- the dual bit memory cell 202 is generally symmetrical, thus the drain 210 and the source 208 are interchangeable.
- the left junction 208 may serve as the source terminal and the right junction 210 as the drain terminal with respect to the right bit 220.
- the right junction 210 may serve as the source terminal and the left junction 208 as the drain terminal for the left bit 222.
- the system 202 includes a DC voltage source 230 having a first terminal 232 and a second terminal 234, adapted to selectively apply a voltage across two of the source 208, the drain 210, and the gate 216 vial switching devices 236 and 238 connected to the first and second terminals 232 and 234, respectively.
- Source 230 moreover, may selectively apply positive or negative voltages to one or both of the terminals 232 and 234.
- the switching devices 236 and 238 are controlled by a logic device 240 via control lines 242 and 244, respectively.
- the system 202 further comprises a DC current sensor 250 having a first terminal 252 connected to a switching device 254 providing selective connection of the terminal 252 with one of the source 208, the drain 210, and the gate 216.
- the logic device 240 controls the position of switching device 254 via a control line 256.
- Current sensor 250 further includes a second terminal 258 connected to a common or ground.
- the current sensor 250 may also include a sense amplifier circuit (not shown) which is "on-chip" with respect to the cells under test.
- the logic device or circuit 240 is thus adapted to selectively provide for the application of voltages to the dual bit memory cell 200 via source 230 and switching devices 236 and 238, and to selectively measure or sense a current associated therewith using the sensor 250 and switching device 254, in order to selectively program, erase, read, and/or verify erasure of one or both bits 220 and 222 of the cell 200.
- the logic circuit 240 may also reside "on-chip" with respect to the memory cells under test.
- the cell 200 moreover, may be connected with other such cells (not shown) in a NOR type configuration (e.g ., with the respective gates 216 thereof connected together by a common word line associated with a row of such cells).
- the system 202 may accordingly further include circuitry for individually applying voltages and/or measuring currents associated therewith (not shown).
- individual flash cells may be individually addressed via the logic device 240 for programming (writing), reading or erasing functions.
- bit 220 may be programmed by applying programming voltages to the gate 216 and drain 210 while the source 208 is grounded. Hot electrons are accelerated sufficiently to be injected into the circled region 220 of the trapping dielectric layer 204 near the drain 210.
- Bit 220 of cell 200 may be read in the opposite direction via application of voltages to the gate 216 and the source 208 while the drain 210 is grounded.
- Bit 222 may be programmed by applying programming voltages to the gate 216 and source 208 while the drain 210 is grounded.
- Bit 222 may be read in the opposite direction by applying voltages to the gate 216 and the drain 210 while the source 208 is grounded. Both bits 220 and 222 of cell 200 may be erased by applying erase voltages or pulses to the gate 216 and the drain 210 to erase bit 220, and to the gate 216 and the source 208 to erase bit 222, thereby causing electrons to be removed from the charge trapping region of the nitride layer 204. Electrons move from the nitride through the bottom oxide layer 214 to the drain 210 or the source 208 for bits 220 and 222, respectively.
- a predetermined voltage greater than the threshold voltage of an unprogrammed or erased cell bit, but less than the threshold voltage of a programmed bit is applied to the gate 216 with a voltage applied between the source 208 and the drain 210. If the bit 220 conducts ( e.g ., as sensed by the sensor 250), then the bit 220 has been erased. Alternatively, if the cell bit 220 does not conduct (or only a small leakage current is measured by the sensor 250) then the bit 220 has not been properly erased. In order to erase the bit 220, an erase voltage pulse is applied to the gate 216 with the drain 210 floated, while the source 208 is held at a positive potential.
- the system 202 is thus adapted to selectively verify proper erasure of one or both of the bits 220 and 222 of the dual bit cell 200, and to selectively erase one or both of the bits 220 and 222 if an erase verification fails for one of these bits.
- the logic device 250 may be adapted to verify proper erasure of the dual bit cell 200 by selectively verifying, re-verifying, and/or re-erasing one or both bits 220 and 222 thereof in accordance with the methods 22, 50, and/or 100 of Figs. 2 , 3 , and 5A-5D , respectively.
- the method of the present invention may be used in the field of flash memory device testing to verify proper erasure of dual bit flash memory cells.
Abstract
Description
- The present invention relates generally to memory systems and in particular to a method for verifying erasure of sectors of bits in electronic memory devices.
- Flash memory is a type of electronic memory media which can be rewritten and hold its content without power. Flash memory devices generally have life spans from 100K to 300K write cycles. Unlike dynamic random access memory (DRAM) and static random access memory (SRAM) memory chips, in which a single byte can be erased, flash memory is typically erased and written in fixed multi-bit blocks or sectors. Evolving out of electrically erasable read only memory (EEPROM) chip technology, which can be erased in place, flash memory is less expensive and more dense. This new category of EEPROMs has emerged as an important nonvolatile memory which combines the advantages of EPROM density with EEPROM electrical erasability.
- Conventional flash memories are constructed in a cell structure wherein a single bit of information is stored in each cell. In such single bit memory architectures, each cell typically includes a metal oxide semiconductor (MOS) transistor structure having a source, a drain, and a channel in a substrate or P-well, as well as a stacked gate structure overlying the channel. The stacked gate may further include a thin gate dielectric layer (sometimes referred to as a tunnel oxide) formed on the surface of the P-well. The stacked gate also includes a polysilicon floating gate overlying the tunnel oxide and an interpoly dielectric layer overlying the floating gate. The interpoly dielectric layer is often a multilayer insulator such as an oxide-nitride-oxide (ONO) layer having two oxide layers sandwiching a nitride layer. Lastly, a polysilicon control gate overlies the interpoly dielectric layer.
- The control gate is connected to a word line associated with a row of such cells to form sectors of such cells in a typical NOR configuration. In addition, the drain regions of the cells are connected together by a conductive bit line. The channel of the cell conducts current between the source and the drain in accordance with an electric field developed in the channel by the stacked gate structure. In the NOR configuration, each drain terminal of the transistors within a single column is connected to the same bit line. In addition, each flash cell has its stacked gate terminal coupled to a different word line, while all the flash cells in the array have their source terminals coupled to a common source terminal. In operation, individual flash cells are addressed via the respective bit line and word line using peripheral decoder and control circuitry for programming (writing), reading or erasing functions.
- Such a single bit stacked gate flash memory cell is programmed by applying a relatively high voltage to the control gate and connecting the source to ground and the drain to a predetermined potential above the source. A resulting high electric field across the tunnel oxide leads to a phenomena called "Fowler-Nordheim" tunneling. During this process, electrons in the core cell channel region tunnel through the gate oxide into the floating gate and become trapped in the floating gate since the floating gate is surrounded by the interpoly dielectric and the tunnel oxide. As a result of the trapped electrons, the threshold voltage of the cell increases. This change in the threshold voltage (and thereby the channel conductance) of the cell created by the trapped electrons is what causes the cell to be programmed.
- In order to erase a typical single bit stacked gate flash memory cell, a relatively high voltage is applied to the source, and the control gate is held at a negative potential, while the drain is allowed to float. Under these conditions, a strong electric field is developed across the tunnel oxide between the floating gate and the source. The electrons that are trapped in the floating gate flow toward and cluster at the portion of the floating gate overlying the source region and are extracted from the floating gate and into the source region by way of Fowler-Nordheim tunneling through the tunnel oxide. As the electrons are removed from the floating gate, the cell is erased.
- In conventional single bit flash memory devices, an erase verification is performed to determine whether each cell in a block or set of such cells has been properly erased. Current single bit erase verification methodologies provide for verification of bit or cell erasure, and application of supplemental erase pulses to individual cclls which fail the initial verification. Thereafter, the erased status of the cell is again verified, and the process continues until the cell or bit is successfully erased or the cell is marked as unusable.
-
WO97/48098 -
US 6,011,725 discloses a read only memory capable of storing two bits of information, which includes a method of programming, reading and erasing the two bit device. - Recently, dual bit flash memory cells have been introduced, which allow the storage of two bits of information in a single memory cell. The conventional erase verification methods employed with single bit stacked gate architectures may be applied in certain circumstances to such dual bit devices. However, there is a need for new and improved erase verification methods and systems, which ensure proper erasure of data bits in a dual bit memory architecture, and which account for the structural characteristics thereof
- A method according to
claim 1 is provided which overcomes or minimizes the problems and shortcomings of conventional memory cell erasure verification schemes. The invention is a method for verifying erasure of one or more dual bit cells in a memory device, such as a flash memory. The invention allows for efficient and thorough erasure verification, which minimizes data retention and over-erase issues particular to the dual bit cell architecture. The invention provides significant advantages when employed in association with dual bit memory cells wherein only one bit thereof is actively used for data storage. However, it will be recognized that the invention finds utility in association with dual bit memory cell architectures generally, and that the invention is thus not limited to any particular dual bit cell usage implementation or configuration. - To the accomplishment of the foregoing and related ends, the invention comprises the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative aspects and implementations of the invention. These are indicative, however, of but a few of the various ways in which the principles of the invention may be employed. Other objects, advantages and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the drawings.
-
-
Fig. 1 is a schematic side elevation view in section of an exemplary dual bit memory cell in which various aspects of the present invention may be implemented; -
Fig. 2 is a flow diagram illustrating an exemplary method for verifying memory cell erasure in accordance with an aspect of the invention; -
Fig. 3 is a flow diagram illustrating another exemplary method for verifying memory cell erasure according to the invention; -
Fig. 4 is a flow diagram illustrating an exemplary four phase sector erase operation in which various aspects of the invention may be carried out; -
Fig. 5A is a flow diagram illustrating another exemplary method for verifying memory cell erasure in accordance with another aspect of the invention; -
Fig. 5B is a flow diagram further illustrating the method ofFig. 5A ; -
Fig. 5C is a flow diagram further illustrating the method ofFigs. 5A-5B ; -
Fig. 5D is a flow diagram further illustrating the method ofFigs. 5A-5C ; and -
Fig. 6 is a schematic side elevation view in section of an exemplary dual bit memory cell and a system for verifying erasure thereof. - The following is a detailed description of the present invention made in conjunction with the attached figures, wherein like reference numerals will refer to like elements throughout. The invention provides methodologies and a system for verifying proper erasure of one or more dual bit memory cells, and may be used in conjunction with a chip erase or sector erase operation in a flash memory device. For example, a sector erase or preprogramming operation may be performed in order to apply erase pulses to each such cell in a flash memory device. Thereafter, the invention may be employed in order to verify which cells in the device have been properly erased.
- In addition, the invention selectively attempts to re-erase cells (e.g., via selective application of erase voltage pulses to one or both individual bits in a dual bit memory cell) which have not been properly erased in the preprogramming operation. The invention also provides for selective re-verification of proper erasure of one or both bits in a dual bit cell. Although the invention is hereinafter illustrated and described in association with a dual bit memory cell architecture wherein only one bit of each cell is used for data storage, it will be appreciated that the invention is applicable to other type architectures and other dual bit architecture usage schemes.
- Referring now to the drawings,
Fig. 1 illustrates an exemplary dualbit memory cell 2 in which one or more of the various aspects of the invention may be carried out. Thememory cell 2 comprises asilicon dioxide layer 3 with buried polysilicon islands (not numerically designated) therein. A P-type substrate 4 has buriedN+ source 5 andN+ drain 6 regions. Thesilicon dioxide 3 is sandwiched between two layers ofsilicon dioxide layer 3 may comprise a silicon nitride or any other form of charge trapping layer. - Overlying the
oxide layer 7 is apolysilicon gate 216. Thisgate 9 is doped with an N-type impurity (e.g., phosphorus). Thememory cell 2 is capable of storing two data bits, a left bit represented by the dashed circle A and a right bit represented by the dashed circle B. The dualbit memory cell 2 is generally symmetrical, thus thedrain 6 and thesource 5 are interchangeable. Thus, theleft junction 5 may serve as the source terminal and theright junction 6 as the drain terminal with respect to the right bit B. Likewise, theright junction 6 may serve as the source terminal and theleft junction 5 as the drain terminal for the left bit A. - Various implementations of dual bit memory cell architecture may be verified according to one or more aspects of the present invention. In particular, the invention is applicable to memory devices wherein both bits in the dual bit cells (e.g., bits A and B of cell 2) are used for data or information storage, as well as those in which only one bit (e.g., bit A of cell 2) of the dual bit cell is so used. The inventors of the present invention have found that even where one bit in such a cell is not used for data storage (e.g., bit B of cell 2), that programming and/or erasure of the data storage bit (e.g., bit A) may cause various physical phenomena to occur in the unused bit (e.g., bit B).
- For example, repeated programming of bit A of
cell 2 may cause data retention in bit B and vice versa. Also, repeated application of erase voltage pulses to bit A may cause over erasure of bit B. These phenomena in the unused bit B may in turn cause degradation with respect to the operation of the bit used for data storage (e.g., the ability to effectively read, write/program, and/or erase bit A). The invention addresses these problems with respect to dual bit memory cell technology by selectively verifying, erasing, and re-verifying the individual bits of such memory cells in order to further ensure the proper erasure of the memory cell, for example, in a block or sector erase operation in a flash memory device. - Referring now to
Fig. 2 , anexemplary method 22 is illustrated for memory erasure, which may be advantageously employed in association with one or more dual bit flash memory cells (e.g.,cell 2 ofFig. 1 ), for example, as part of a sector erase operation. For example, once a pre-programming operation has been performed to erase the data bits of a sector of memory (e.g., by writing a 1 value thereto), themethod 22 begins atstep 24, after which the first or "A" bit of a dual bit memory cell (e.g., bit A of cell 2) is verified atstep 26. Atdecision step 28, a determination is made as to whether bit A has been properly erased. As illustrated and described in greater detail hereinafter with respect toFig. 6 , the erasure verification operations performed atsteps method 22, may be carried out via the application of a voltage to the cell and the sensing of a current in the cell. For example, where a properly erased bit in a memory cell has a lower threshold voltage than that of a programmed bit, an appropriate voltage between the programmed bit threshold voltage and that of an erased bit may be applied to two terminals of the three terminal memory structure (e.g., dualbit memory cell 2 ofFig. 1 ), and the resulting current may be sensed to determine whether the bit has been properly erased. - If bit A has been properly erased at
step 28, themethod 22 proceeds to step 30, whereat a verification is performed to verify proper erasure of a second bit "B" in the dual bit architecture memory cell. Only one bit (e.g., bit "A") in the dual bit memory cell is used for data storage in the following discussion. However, it will be appreciated that the method may be advantageously employed in association with dual bit memory cells wherein both bits are used for data storage. In addition, it will be appreciated that the selective verification of both bits in such a dual bit cell accounts for the possibility of data retention and over-erase conditions in one such bit affecting the operation of the other such bit, and accordingly provides for selective verification and re-erasure of such bits, in order to eliminate or minimize the cross effects of such phenomena. - Where it is found at
decision step 32 that the second bit B has also been properly erased, the method proceeds to step 34, whereat it is determined whether more cells (e.g., in a multiple cell memory block or sector) need to be verified. For example, the method may be selectively employed to verify erasure of a certain number of the cells (e.g., eight or sixteen), which are connected in a NOR configuration, although other implementations are possible wherein any number of such cells may be serially verified according to the invention. - If there are other cells to be verified at
decision step 34, the method proceeds to step 36, whereat a cell counter (not shown) may be incremented prior to returning to step 26. Otherwise (e.g., all such cells have been verified), the method ends atstep 38. At this point it will be noted that themethod 22 ensures against the deleterious cross effects of data retention and/or over-erasure of one bit in a dual bit memory cell with respect to the other such bit, by verifying the proper erasure of both bits in each cell prior to moving on to the next cell atstep 36 or ending the process atstep 38. - Referring again to step 28, if bit A in the cell has not been properly erased (e.g., as determined via the bit A verification at step 26), the
method 22 proceeds to step 40 whereat bit A is erased (e.g., via the application of an erase pulse to two terminals of the cell as illustrated and described in greater detail hereinafter). At this point, the proper erasure of bit A could again be verified. However, the inventors of the present invention have found that deleterious consequences may result from the potential repeated erasure and verification of bit A. For instance, the repeated application of erase pulses to bit A may cause over-erasure of bit B. In order to ensure against such an over-erased condition in bit B, themethod 22 verifies proper erasure of bit B atstep 42 following application of an erase pulse to bit A atstep 42. - In this manner, bit B will not be subjected to repeated erase pulses on bit A (and the residual effect thereof on bit B) without being itself verified after each application thereof to bit A. A decision is accordingly made at
step 44 as to whether bit B (e.g., the second bit in the dual bit memory cell) has been properly erased. If so, themethod 22 returns to step 26 for a re-verification of the proper erasure of bit A as described above. Otherwise (bit B is not properly erased),method 22 proceeds to step 46 whereat bit B is again erased (e.g., via application of an erase pulse to the cell) before returning to step 26. It will be noted in this regard, that following application of erase pulses to bit B atstep 46, bit A is verified immediately thereafter atstep 26. This methodology thus prevents repeated application of erase pulses to bit B (and the residual effect thereof on bit A) without bit A being verified after each application thereof to bit B. Themethod 22, thereby reduces the likelihood of over-erasure of the bits A and B caused during the erase verification. - Further in accordance with the
method 22, if it is determined atstep 32 that bit B has not been properly erased (e.g., as verified atstep 30 following a determination atstep 28 that bit A is properly erased), bit B is erased atstep 46, after which themethod 22 returns to step 26. Thus, themethod 22 selectively verifies, re-verifies, erases, and re-erases one or both bits (e.g., bit "A" and bit "B") of a dual bit memory cell in order to ensure that both bits are properly erased (e.g., at step 32) prior to ending atstep 38 or proceeding to another such cell atstep 36. - It will be appreciated in this regard, that the
method 22 may include internal counters or other steps by which a cell may be determined to be unuseable (e.g., unable to be properly erased) after a number of unsuccessful attempts at erasure/verification, whereby the cell (e.g., or a number of related cells, such as a byte or word) may be marked as bad, or the part itself may hang as part of a failed sector erase operation. Further in this regard, if themethod 22 is employed in a manufacturing process (e.g., before or after packaging, but before shipment to a customer), redundancy may be employed to mark a cell or a number of cells as bad, and to provide alternate or redundant storage cells as a replacement, whereby acceptable manufacturing yield may be achieved. Themethod 22 may also be employed in association with a sector or chip erase operation initiated by an end-user, wherein a cell failure may be indicated to the user via the memory device hanging as a result. - Referring now to
Fig. 3 , anotherexemplary method 50 is illustrated for verifying proper memory erasure in accordance with another aspect of the invention. Beginning atstep 52, proper erasure of first and second bits of a dual bit memory cell are verified. If both bits (e.g., bit "A" and bit "B", are properly erased atdecision step 54, the method is finished (e.g., with respect to one cell) atstep 56. It will be appreciated at this point, that themethod 50 may be included within a multiple cell erasure verification routine or method in which another memory cell may be verified following exit from themethod 50 viastep 56. - If one or both of the bits in a dual bit cell are not properly erased at
step 54, a determination is made atdecision step 58 as to whether the first bit is properly erased. If so, the method proceeds to step 60, whereat the second bit is erased (e.g., since the first bit is properly erased, the second must not have been), before themethod 50 returns to step 52 where the erasure of both bits is re-verified. If, however, the first bit is not properly erased atstep 58, the first bit is then erased atstep 62, after which themethod 50 returns to step 52. Themethod 50 thus provides selective erasure and verification of one or both bits in a dual bit memory cell, whereby proper erasure thereof is ensured. In this fashion, the cross-effects (e.g., over-erasure and/or data retention) between two bits in a dual bit memory cell may be accounted for and minimized, for example, by ensuring that the cell is not passed through erasure verification until both bits therein are properly erased. - Referring now to
Fig. 4 , an exemplary four phase sector or block eraseoperation 70 is illustrated beginning atstep 72. In the first pre-programming phase atstep 74, each bit of an array or memory sector is pre-programmed. Atstep 76, in the second phase, a first erase verify operation is performed to verify proper erasure of each cell in the memory sector. Thereafter, in the third phase atstep 78, a soft-programming operation is performed in order to ensure against over-erasure of cells within the sector. In the fourth phase atstep 80, a second erase verification is performed with respect to each cell in the memory sector, in order to ensure against possible deleterious effects of the application of soft programming pulses in the third phase atstep 78. - Referring now to
Figs 5A-5D , anotherexemplary method 100 of memory erasure is illustrated, which may be implemented as part of a multi-phase array or sector erasure operation (e.g.,operation 70 ofFig. 4 ). The details of themethod 100 will be described herein with respect to the erase phases thereof (e.g., phases 2 and/or 4 atsteps operation 70 inFig. 4 ), while the specifics of the pre-programming and soft-programming phases (e.g., steps 74 and 78 of operation 70) will be omitted for the sake of brevity. - The
method 100 begins atstep 102, after which a pulse counter is reset atstep 104. The pulse counter is reset for each sector being erased, and is used in theexemplary method 100 to limit the number of times an erase pulse is applied to a cell, after which the cell may be treated as unusable (e.g., 6000). A do-sector flag DOSECT is tested atdecision step 106, and if set (true), a latched sector of the memory device is erased and verified as described in greater detail hereinafter. Initially, any sectors which are to be erased may be latched, causing the DOSECT flag to be set. An any-erase flag AERS is tested atstep 108, which is true if a chip erase or sector erase operation is to be performed, and false if a byte programming operation is to be performed. If AERS is false, themethod 100 terminates atstep 110. - If AERS is true, a sector address counter is incremented at
step 112, which is then compared to a max sector address atdecision step 114. The designated sectors to be erased are pre-programmed in the first phase of themethod 100, the detailed discussion of which is omitted for the sake of brevity. Pre-programming proceeds through the various steps ofmethod 100 as illustrated inFigs. 5A-5D , after which the maximum sector address is reached atstep 114. Pre-programming having thus been completed,method 100 continues atdecision step 116, where a first_VERIFY flag is tested. The first_VERIFY flag is initially false (logic 0) during the preprogramming phase, and is set atstep 118 upon completion thereof, after which themethod 100 returns to step 102. Where the max sector address has not been reached atstep 114, a second_VERIFY flag is set to 0 atstep 119. - Once in the second phase (first_VERIFY =1), the pulse counter is again reset at
step 104, and the DOSECT flag is tested atstep 106. If true (erasure of at least one memory sector is to be verified), themethod 100 proceeds to step 120 ofFig. 5C , whereat an erasure verification pulse or voltage is applied to a memory cell. The verification pulse is applied for a minimum time period viawait step 122, after which the proper erasure of the cell bit is tested atstep 124. For example, the erasure of a bit may be tested by application of a voltage to a memory cell atsteps step 124, as described in greater detail hereinafter. - If MATCH is true at step 126 (the cell bit has been properly erased), AERS is tested at
step 128, and if false (e.g., byte programming operation being performed), the method terminates atstep 110 ofFig. 5A . If AERS is true (e.g., sector erase or chip erase enabled), the first_VERIFY flag is tested at step 130 (which is true for the first erase verify phase), and the method proceeds to step 132 ofFig. 5B . A SIDE_B flag is tested atstep 132, which is initially false (logic 0), indicating that side "A" of a dual bit memory cell is being verified (e.g., bit A ofcell 2 inFig. 1 ). At this point, it will be recognized that where the first_VERIFY flag is false atdecision step 130 ofFig. 5C (e.g., during pre-programming), the method does not proceed to step 132. Rather, the byte address is incremented and the pulse counter is reset atstep 133, where afterdecision step 174 tests whether the maximum column address has been reached, as described in greater detail hereinafter. - Referring again to step 132 of
Fig. 5B , where the SIDE_B flag is false, themethod 100 proceeds to step 134 inFig. 5B , whereat an INCA0 operation is performed (whereby a flag is incremented, which indicates whether side "A" or side "B" is being operated on), in order to change the verification to the "B" side of the dual bit cell. In addition, the pulse counter is reset atstep 134, where after a flag SIDE_B is set to 1, and a flag PASS_ONCE is set to 1 atstep 136. The PASS_ONCE flag is set to 1 when the. "A" side of a cell has been verified as properly erased, and is reset to 0 whenever an erase pulse is applied to one of the "A" or "B" sides of the cell. - Proceeding on to step 120 of
Fig. 5C , themethod 100 proceeds again throughsteps method 100 proceeds back to step 132 ofFig. 5B viasteps logic 1 by virtue of being set previously at step 136). A flag into_SFPGM is tested at step 140 (used to indicate entry into the third soft-programming phase) and found to be false, whereby the PASS_ONCE flag is tested atstep 142. This having been previously set atstep 136, the method proceeds to step 144 where an INCAO operation is performed (indicating that side "A" is now to be operated on), and the pulse counter is again reset. - Thus, where both the "A" and the "B" side bits of a dual bit memory cell are verified in succession to have been properly erased, the
method 100 increments a byte address counter (INCBA operation) and sets a SIDE_B flag equal to 0 atstep 146. In this manner, the erasure of a cell is deemed proper only when both bits of the cell are properly erased, thus accounting for the possibility that over erasure and/or data retention with respect to one bit in a dual bit cell may have a deleterious effect on operation of the other bit in the cell, and ensuring the proper erasure of both bits in sequence prior to proceeding to the next address. Where only the side "B" has been properly verified as erased, the flag PASS_ONCE will be false (logic 0) atdecision step 142, after which themethod 100 proceeds to step 148 whereat the flag SIDE_B is set to 0, and an INCA0 operation is performed, thus switching back to the other (e.g., "A") side of the dual bit memory cell. - Referring again to step 126 of
Fig. 5C , where one side or bit of a dual bit memory cell fails the erasure verification atstep 126, a MaxPC flag is tested atstep 150 in order to determine whether the pulse counter has reached a maximum value. For example, where themethod 100 applies erase pulses to a cell or a bit therein, a pulse counter is employed to ensure that the method applies only a certain number of such pulses (e.g., 6000) in attempting to re-erase a cell failing verification, before the cell is determined to be unuseable and the operation hangs (e.g., or otherwise indicates the existence of an unusable cell) atstep 152. Assuming such a maximum has not been reached, the PASS_ONCE flag is set to 0 atstep 154 anddecision step 156 determines whether the first_VERIFY is true (method 100 is presently in the first verify phase, indicating that the pre-programming phase has been previously completed). If so, the into_SFPGM flag is tested atstep 158. While in the first erase verify phase, this flag is false (logic 0), and themethod 100 proceeds to step 160 whereat a need_reverify flag is set, indicating that a cell bit is to be re-verified. - Proceeding then to
steps Fig. 5C , an erase pulse of a certain time duration is applied to the cell with respect to the cell side or bit, where after the need_reverify flag is tested atstep 168. If false (e.g., indicating that the operation is in either the pre-programming or soft program phase), themethod 100 returns to again to step 120 where appropriate pre-programming or soft programming verification is performed viasteps method 100 proceeds to step 170 ofFig. 5A , whereat the need_reverify flag is reset to 0. Thereafter atstep 172, the pulse counter is reset and an INCAO operation is performed to focus on the other side of the memory cell. In this fashion, where one side of a cell fails erase verification (e.g., at steps 120-126), an erase pulse is applied thereto (e.g., atsteps 164 and 166).Method 100 then proceeds back to step 102, and the process is repeated until both sides or bits of a cell are properly verified, or the maximum number of pulses is applied in an attempt to properly erase one or both of the bits, and the method hangs atstep 152. - Returning to
Fig. 5B , when the PASS_ONCE flag is true at step 142 (e.g., indicating that both the "A" and "B" side bits were successfully verified in succession), an INCAO operation is performed at step 144 (e.g., to point back to the "A" side), and the pulse counter is reset, after which the byte address is incremented atstep 146 and the SIDE_B flag is set to 0. Thereafter,method 100 proceeds atstep 174 ofFig. 5C , where it is determined whether the maximum column address (e.g., the end of a word line) has been reached. If not, the remaining columns in the word are verified as described above. If so,decision step 180 ofFig. 5D determines whether the maximum byte address (e.g., the last byte of the current sector) has been completed. If not, the remaining bytes in the sector are verified as described above. - If all sector bytes have been verified in the second phase (e.g., the first erase verify phase), at step 182 (first_VERIFY flag is true), and the second_VERIFY flag is false at
step 184,decision step 186 tests the into_SFPGM flag. At this point, the first erase verification phase is complete, and the method proceeds to set the into_SFPGM flag atstep 188, whereby the soft programming phase is implemented, the detailed description of which is omitted for the sake of brevity. In this regard, it will be noted that the soft programming phase advantageously verifies and selectively adjusts the threshold voltage of the cell bits, to ensure against possible over-erasure thereof which may have been caused by the application of the erase pulses (e.g., atsteps 164 and 166) during the first erase verification phase. In addition, it will be appreciated that during the pre-programming phase, the first_VERIFY flag is false, and thus, thatdecision step 130 ofFig. 5C accordingly transfersmethod 100 to step 133, rather than to step 132 ofFig. 5B , whereby the pre-programming phase does not include the alternation between cell sides or bits, as do the erasure verification phases. It will be further noted in this regard, that the first_VERIFY flag is set during the soft programming phase, whereby alternation between cell bits or sides is achieved. - Once the soft programming phase has been completed, the into_SFPGM flag is found to be true at
decision step 186, whereby the second_VERIFY flag is set to 1 at step 190 (e.g., indicating that the second erase verification ofoperation phase 4 is to be performed next) and the into_SFPGM flag is reset to 0 at step 192 (e.g., indicating that soft programming has been completed). Thereafter, themethod 100 again verifies proper erasure of the designated sector cells via the steps described above. It will be noted at this point, that the second verify pass (e.g., wherein the flag second_VERIFY is true) may be employed to ensure that any soft programming pulses applied during the soft programming phase have not inadvertently caused cell bits to fail the erase verification. In practice, the second erase verification phase proceeds with very few or no verification failures, selectively re-erasing certain bits as the need arises according to the verification steps 120-126. - Referring now to
Fig. 6 , an exemplary dualbit memory cell 200 is illustrated in section, together with asystem 202 for verifying erasure thereof, in accordance with another aspect of the invention. It will be recognized that the above describedmethods Figs. 2 ,3 , and5A-5D , respectively, may be employed in conjunction with theexemplary system 202. In addition, those skilled in the art will appreciate that the foregoing methodologies may be implemented in association with many systems other than thesystem 202. Thememory cell 200 comprises asilicon dioxide layer 204 with buried polysilicon islands (not numerically designated) therein. A P-type substrate 206 has buriedN+ source 208 and N+ drain 210 regions. Thesilicon dioxide 204 is sandwiched between two layers ofsilicon dioxide layer 204 may comprise a silicon nitride or any other form of charge trapping layer. - Overlying the
oxide layer 212 is apolysilicon gate 216. Thisgate 216 is doped with an N-type impurity (e.g., phosphorus). Thememory cell 200 is capable of storing two data bits, a right bit represented by the dashedcircle 220 and a left bit represented by the dashedcircle 222. The dualbit memory cell 202 is generally symmetrical, thus thedrain 210 and thesource 208 are interchangeable. Thus, theleft junction 208 may serve as the source terminal and theright junction 210 as the drain terminal with respect to theright bit 220. Likewise, theright junction 210 may serve as the source terminal and theleft junction 208 as the drain terminal for theleft bit 222. - The
system 202 includes aDC voltage source 230 having afirst terminal 232 and asecond terminal 234, adapted to selectively apply a voltage across two of thesource 208, thedrain 210, and thegate 216vial switching devices second terminals Source 230, moreover, may selectively apply positive or negative voltages to one or both of theterminals devices logic device 240 viacontrol lines system 202 further comprises a DCcurrent sensor 250 having afirst terminal 252 connected to aswitching device 254 providing selective connection of the terminal 252 with one of thesource 208, thedrain 210, and thegate 216. Thelogic device 240 controls the position of switchingdevice 254 via acontrol line 256.Current sensor 250 further includes asecond terminal 258 connected to a common or ground. Thecurrent sensor 250 may also include a sense amplifier circuit (not shown) which is "on-chip" with respect to the cells under test. - The logic device or
circuit 240 is thus adapted to selectively provide for the application of voltages to the dualbit memory cell 200 viasource 230 and switchingdevices sensor 250 and switchingdevice 254, in order to selectively program, erase, read, and/or verify erasure of one or bothbits cell 200. Thelogic circuit 240 may also reside "on-chip" with respect to the memory cells under test. Thecell 200, moreover, may be connected with other such cells (not shown) in a NOR type configuration (e.g., with therespective gates 216 thereof connected together by a common word line associated with a row of such cells). Thesystem 202 may accordingly further include circuitry for individually applying voltages and/or measuring currents associated therewith (not shown). - In operation, individual flash cells (e.g., cell 200) may be individually addressed via the
logic device 240 for programming (writing), reading or erasing functions. For example,bit 220 may be programmed by applying programming voltages to thegate 216 and drain 210 while thesource 208 is grounded. Hot electrons are accelerated sufficiently to be injected into the circledregion 220 of the trappingdielectric layer 204 near thedrain 210.Bit 220 ofcell 200 may be read in the opposite direction via application of voltages to thegate 216 and thesource 208 while thedrain 210 is grounded.Bit 222 may be programmed by applying programming voltages to thegate 216 andsource 208 while thedrain 210 is grounded. Hot electrons are thereby injected into the circledregion 222 of the trappingdielectric layer 204 near thesource 208.Bit 222 may be read in the opposite direction by applying voltages to thegate 216 and thedrain 210 while thesource 208 is grounded. Bothbits cell 200 may be erased by applying erase voltages or pulses to thegate 216 and thedrain 210 to erasebit 220, and to thegate 216 and thesource 208 to erasebit 222, thereby causing electrons to be removed from the charge trapping region of thenitride layer 204. Electrons move from the nitride through thebottom oxide layer 214 to thedrain 210 or thesource 208 forbits - To verify erasure of the
memory cell bit 220, a predetermined voltage greater than the threshold voltage of an unprogrammed or erased cell bit, but less than the threshold voltage of a programmed bit, is applied to thegate 216 with a voltage applied between thesource 208 and thedrain 210. If thebit 220 conducts (e.g., as sensed by the sensor 250), then thebit 220 has been erased. Alternatively, if thecell bit 220 does not conduct (or only a small leakage current is measured by the sensor 250) then thebit 220 has not been properly erased. In order to erase thebit 220, an erase voltage pulse is applied to thegate 216 with thedrain 210 floated, while thesource 208 is held at a positive potential. Thesystem 202 is thus adapted to selectively verify proper erasure of one or both of thebits dual bit cell 200, and to selectively erase one or both of thebits logic device 250 may be adapted to verify proper erasure of thedual bit cell 200 by selectively verifying, re-verifying, and/or re-erasing one or bothbits methods Figs. 2 ,3 , and5A-5D , respectively. Although the invention has been shown and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art upon the reading and understanding of this specification and the annexed drawings. - The method of the present invention may be used in the field of flash memory device testing to verify proper erasure of dual bit flash memory cells.
Claims (7)
- A method (22) of verifying erasure of a dual bit memory cell, the dual bit memory cell storing dual bits at physically separate locations in said cell, and overcoming the deleterious cross-effects of data retention and/or over erasure of a first bit of the dual bit cell with respect to a second bit of the dual bit cell, comprising:performing a determination (26,28) of whether a first bit in the dual bit memory cell is properly erased;performing a first verification (30,32) of whether a second bit in the dual bit memory cell is properly erased if the first bit is properly erased;determining that the dual bit memory cell is properly erased if the first bit is properly erased and if the second bit is properly erased according to the first verification;erasing the first bit (40) if the first bit is not properly erased; andperforming the first verification (42,44) of whether the second bit is properly erased after erasing the first bit;erasing the second bit (46) if the second bit is not properly erased according to the first verification (42, 44);repeating the determination (26,28) of whether the first bit in the dual bit memory cell is properly erased;repeating the first verification (30,32) of whether the second bit in the dual bit memory cell is properly erased if the first bit is properly erased; anddetermining that the dual bit memory cell is properly erased if the first bit is properly erased and if the second bit is properly erased according to the first verification.
- The method (22) of claim 1, wherein performing the first verification (42,44) of whether the second bit is properly erased comprises:applying a voltage signal to the cell;sensing a current in the cell; andverifying whether the second bit is properly erased according to the sensed current.
- The method (22) of claim 1, further comprising:repeating the determination (26,28) of whether the first bit in the dual bit memory cell is properly erased if the second bit is properly erased according to the first verification (42,44);repeating the first verification (30,32) of whether the second bit in the dual bit memory cell is properly erased if the first bit is properly erased; anddetermining that the dual bit memory cell is properly erased if the first bit is properly erased and if the second bit is properly erased according to the repeated first verification.
- The method (22) of claim 1, further comprising:erasing the second bit again (46) if the second bit is not properly erased according to the repeated first verification (30,32);again repeating the determination (26,28) of whether the first bit in the dual bit memory cell is properly erased;again repeating the first verification (30,32) of whether the second bit in the dual bit memory cell is properly erased if the first bit is properly erased; anddetermining that the dual bit memory cell is properly erased if the first bit is properly erased and if the second bit is properly erased according to the repeated first verification.
- The method (22) of claim 1, further comprising:erasing the second bit (46) if the second bit is not properly erased according to the first verification (30, 32);repeating the determination (26,28) of whether the first bit in the dual bit memory cell is properly erased;repeating the first verification (30,32) of whether the second bit in the dual bit memory cell is properly erased if the first bit is properly erased; anddetermining that the dual bit memory cell is properly erased if the first bit is properly erased and if the second bit is properly erased according to the repeated first verification.
- The method (22) of claim 5, further comprising:erasing (40) the first bit if the first bit is not properly erased;performing a second verification (42,44) of whether the second bit is properly erased after erasing the first bit; andrepeating the determination (26,28) of whether the first bit in the dual bit memory cell is properly erased if the second bit is properly erased according to the second verification (42,44);repeating the first verification (30,32) of whether the second bit in the dual bit memory cell is properly erased if the first bit is properly erased; anddetermining that the dual bit memory cell is properly erased if the first bit is properly erased and if the second bit is properly erased according to the repeated first verification.
- A method (22) for erasing a plurality of dual bit flash memory cells, each of the dual bit memory cells storing dual bits at physically separate locations in said cells, comprising the steps of:erasing the plurality of dual bit flash memory cells; before verifying proper erasure of a first bit (26,28) and a second bit (30,32) in at least one of the plurality of dual bit flash memory cells using the method of verifying erasure of claim 1.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/717,550 US6331951B1 (en) | 2000-11-21 | 2000-11-21 | Method and system for embedded chip erase verification |
US717550 | 2000-11-21 | ||
PCT/US2001/024828 WO2002043073A1 (en) | 2000-11-21 | 2001-08-07 | Method and system for dual bit memory erase verification |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1350253A1 EP1350253A1 (en) | 2003-10-08 |
EP1350253B1 true EP1350253B1 (en) | 2010-09-22 |
Family
ID=24882474
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP01961964A Expired - Lifetime EP1350253B1 (en) | 2000-11-21 | 2001-08-07 | Method for dual bit memory erase verification |
Country Status (9)
Country | Link |
---|---|
US (1) | US6331951B1 (en) |
EP (1) | EP1350253B1 (en) |
JP (1) | JP4601250B2 (en) |
KR (1) | KR100788491B1 (en) |
CN (1) | CN1322515C (en) |
AU (1) | AU2001283185A1 (en) |
DE (1) | DE60143125D1 (en) |
TW (1) | TW519652B (en) |
WO (1) | WO2002043073A1 (en) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6992938B1 (en) * | 2001-12-06 | 2006-01-31 | Virage Logic Corporation | Methods and apparatuses for test circuitry for a dual-polarity non-volatile memory cell |
US6788574B1 (en) | 2001-12-06 | 2004-09-07 | Virage Logic Corporation | Electrically-alterable non-volatile memory cell |
US6842375B1 (en) | 2001-12-06 | 2005-01-11 | Virage Logic Corporation | Methods and apparatuses for maintaining information stored in a non-volatile memory cell |
US7130213B1 (en) | 2001-12-06 | 2006-10-31 | Virage Logic Corporation | Methods and apparatuses for a dual-polarity non-volatile memory cell |
US6639271B1 (en) * | 2001-12-20 | 2003-10-28 | Advanced Micro Devices, Inc. | Fully isolated dielectric memory cell structure for a dual bit nitride storage device and process for making same |
US7001807B1 (en) | 2001-12-20 | 2006-02-21 | Advanced Micro Devices, Inc. | Fully isolated dielectric memory cell structure for a dual bit nitride storage device and process for making same |
US6532175B1 (en) * | 2002-01-16 | 2003-03-11 | Advanced Micro Devices, In. | Method and apparatus for soft program verification in a memory device |
TWI259952B (en) * | 2002-01-31 | 2006-08-11 | Macronix Int Co Ltd | Data erase method of flash memory |
US6639844B1 (en) * | 2002-03-13 | 2003-10-28 | Advanced Micro Devices, Inc. | Overerase correction method |
US6901010B1 (en) * | 2002-04-08 | 2005-05-31 | Advanced Micro Devices, Inc. | Erase method for a dual bit memory cell |
US6700822B1 (en) * | 2002-05-15 | 2004-03-02 | Taiwan Semiconductor Manufacturing Company | Pre-decoder for glitch free word line addressing in a memory device |
JP2003346484A (en) * | 2002-05-23 | 2003-12-05 | Mitsubishi Electric Corp | Nonvolatile semiconductor storage device |
EP1381057B1 (en) * | 2002-07-10 | 2008-12-03 | STMicroelectronics S.r.l. | Line selector for a matrix of memory elements |
JP2004079602A (en) * | 2002-08-12 | 2004-03-11 | Fujitsu Ltd | Nonvolatile memory having trap layer |
US6735114B1 (en) | 2003-02-04 | 2004-05-11 | Advanced Micro Devices, Inc. | Method of improving dynamic reference tracking for flash memory unit |
US6975541B2 (en) * | 2003-03-24 | 2005-12-13 | Saifun Semiconductors Ltd | Alternating application of pulses on two sides of a cell |
US6956768B2 (en) * | 2003-04-15 | 2005-10-18 | Advanced Micro Devices, Inc. | Method of programming dual cell memory device to store multiple data states per cell |
US6778442B1 (en) | 2003-04-24 | 2004-08-17 | Advanced Micro Devices, Inc. | Method of dual cell memory device operation for improved end-of-life read margin |
US6822909B1 (en) | 2003-04-24 | 2004-11-23 | Advanced Micro Devices, Inc. | Method of controlling program threshold voltage distribution of a dual cell memory device |
US6775187B1 (en) | 2003-04-24 | 2004-08-10 | Advanced Micro Devices, Inc. | Method of programming a dual cell memory device |
US6768673B1 (en) | 2003-04-24 | 2004-07-27 | Advanced Micro Devices, Inc. | Method of programming and reading a dual cell memory device |
EP1656677A1 (en) * | 2003-08-13 | 2006-05-17 | Koninklijke Philips Electronics N.V. | Improved erase and read schemes for charge trapping non-volatile memories |
US7206224B1 (en) | 2004-04-16 | 2007-04-17 | Spansion Llc | Methods and systems for high write performance in multi-bit flash memory devices |
US6834012B1 (en) * | 2004-06-08 | 2004-12-21 | Advanced Micro Devices, Inc. | Memory device and methods of using negative gate stress to correct over-erased memory cells |
US6987696B1 (en) * | 2004-07-06 | 2006-01-17 | Advanced Micro Devices, Inc. | Method of improving erase voltage distribution for a flash memory array having dummy wordlines |
US7042766B1 (en) | 2004-07-22 | 2006-05-09 | Spansion, Llc | Method of programming a flash memory device using multilevel charge storage |
US7042767B2 (en) * | 2004-08-02 | 2006-05-09 | Spansion, Llc | Flash memory unit and method of programming a flash memory device |
US7180775B2 (en) * | 2004-08-05 | 2007-02-20 | Msystems Ltd. | Different numbers of bits per cell in non-volatile memory devices |
US7167398B1 (en) * | 2005-02-23 | 2007-01-23 | Spansion L.L.C. | System and method for erasing a memory cell |
US7158416B2 (en) * | 2005-03-15 | 2007-01-02 | Infineon Technologies Flash Gmbh & Co. Kg | Method for operating a flash memory device |
US7113431B1 (en) * | 2005-03-29 | 2006-09-26 | Spansion Llc | Quad bit using hot-hole erase for CBD control |
US8116142B2 (en) | 2005-09-06 | 2012-02-14 | Infineon Technologies Ag | Method and circuit for erasing a non-volatile memory cell |
JP4672024B2 (en) | 2005-12-15 | 2011-04-20 | スパンション エルエルシー | Nonvolatile memory device and control method of nonvolatile memory device |
US7319615B1 (en) | 2006-08-02 | 2008-01-15 | Spansion Llc | Ramp gate erase for dual bit flash memory |
US7672159B2 (en) * | 2007-01-05 | 2010-03-02 | Macronix International Co., Ltd. | Method of operating multi-level cell |
US7548462B2 (en) * | 2007-06-29 | 2009-06-16 | Macronix International Co., Ltd. | Double programming methods of a multi-level-cell nonvolatile memory |
CN101923900B (en) * | 2009-06-09 | 2014-06-11 | 北京兆易创新科技股份有限公司 | Erasing method and device for non-volatile memory |
KR200458048Y1 (en) * | 2009-09-14 | 2012-01-18 | 배승관 | Lock device for adjusting wire length |
CN102890617B (en) * | 2011-07-18 | 2015-06-10 | 群联电子股份有限公司 | Memory control method, memory controller and memory storage device |
KR102569820B1 (en) * | 2018-10-25 | 2023-08-24 | 에스케이하이닉스 주식회사 | Memory controller and operating method thereof |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US517338A (en) * | 1894-03-27 | Coupling for cable-conveyers | ||
US5172338B1 (en) | 1989-04-13 | 1997-07-08 | Sandisk Corp | Multi-state eeprom read and write circuits and techniques |
US5163021A (en) * | 1989-04-13 | 1992-11-10 | Sundisk Corporation | Multi-state EEprom read and write circuits and techniques |
KR0172401B1 (en) * | 1995-12-07 | 1999-03-30 | 김광호 | Non-volatile semiconductor memory device |
DE69630320T2 (en) * | 1996-06-14 | 2004-07-29 | Macronix International Co. Ltd., Hsinchu | SIDE MODE FLOATING GATE MEMORY ARRANGEMENT WITH MULTI-BIT CELLS |
US5862074A (en) * | 1996-10-04 | 1999-01-19 | Samsung Electronics Co., Ltd. | Integrated circuit memory devices having reconfigurable nonvolatile multi-bit memory cells therein and methods of operating same |
KR100227638B1 (en) | 1996-11-22 | 1999-11-01 | 김영환 | Erasing circuit of a flash memory |
JP3409986B2 (en) * | 1997-01-31 | 2003-05-26 | 株式会社東芝 | Multi-valued memory |
US5928370A (en) | 1997-02-05 | 1999-07-27 | Lexar Media, Inc. | Method and apparatus for verifying erasure of memory blocks within a non-volatile memory structure |
US6768165B1 (en) * | 1997-08-01 | 2004-07-27 | Saifun Semiconductors Ltd. | Two bit non-volatile electrically erasable and programmable semiconductor memory cell utilizing asymmetrical charge trapping |
KR100257854B1 (en) | 1997-12-10 | 2000-06-01 | 김영환 | Method of erasing flash memory |
JP3672435B2 (en) * | 1998-04-22 | 2005-07-20 | 富士通株式会社 | Nonvolatile memory device |
KR20000030974A (en) | 1998-10-29 | 2000-06-05 | 김영환 | Method and device for verifying elimination of serial flash memory |
-
2000
- 2000-11-21 US US09/717,550 patent/US6331951B1/en not_active Expired - Lifetime
-
2001
- 2001-08-07 AU AU2001283185A patent/AU2001283185A1/en not_active Abandoned
- 2001-08-07 CN CNB018192920A patent/CN1322515C/en not_active Expired - Fee Related
- 2001-08-07 DE DE60143125T patent/DE60143125D1/en not_active Expired - Lifetime
- 2001-08-07 JP JP2002544726A patent/JP4601250B2/en not_active Expired - Fee Related
- 2001-08-07 EP EP01961964A patent/EP1350253B1/en not_active Expired - Lifetime
- 2001-08-07 WO PCT/US2001/024828 patent/WO2002043073A1/en active Application Filing
- 2001-08-07 KR KR1020037006839A patent/KR100788491B1/en not_active IP Right Cessation
- 2001-11-06 TW TW090127469A patent/TW519652B/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
CN1478281A (en) | 2004-02-25 |
KR100788491B1 (en) | 2007-12-24 |
JP2004515024A (en) | 2004-05-20 |
WO2002043073A1 (en) | 2002-05-30 |
KR20030048159A (en) | 2003-06-18 |
AU2001283185A1 (en) | 2002-06-03 |
CN1322515C (en) | 2007-06-20 |
US6331951B1 (en) | 2001-12-18 |
TW519652B (en) | 2003-02-01 |
JP4601250B2 (en) | 2010-12-22 |
DE60143125D1 (en) | 2010-11-04 |
EP1350253A1 (en) | 2003-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1350253B1 (en) | Method for dual bit memory erase verification | |
US6553510B1 (en) | Memory device including redundancy routine for correcting random errors | |
US5862081A (en) | Multi-state flash EEPROM system with defect management including an error correction scheme | |
US7180781B2 (en) | Memory block erasing in a flash memory device | |
US7463532B2 (en) | Comprehensive erase verification for non-volatile memory | |
US6512701B1 (en) | Erase method for dual bit virtual ground flash | |
US6567303B1 (en) | Charge injection | |
US6788580B2 (en) | Nonvolatile semiconductor storage device and data erasing method | |
KR100960352B1 (en) | Method of erasing a flashing memory using a pre-reasing step | |
KR20040097313A (en) | Algorithm dynamic reference programming | |
US6172915B1 (en) | Unified erase method in flash EEPROM | |
JP4106028B2 (en) | Method and apparatus for soft program verification in a memory device | |
US6934190B1 (en) | Ramp source hot-hole programming for trap based non-volatile memory devices | |
US6901010B1 (en) | Erase method for a dual bit memory cell | |
KR100519534B1 (en) | Method of erasing a flash memory device | |
JP2005516330A (en) | Charge injection | |
US6370065B1 (en) | Serial sequencing of automatic program disturb erase verify during a fast erase mode | |
US8379443B2 (en) | Charge retention for flash memory by manipulating the program data methodology | |
JPH05234382A (en) | Nonvolatile memory device | |
KR20070036043A (en) | Semiconductor device and program method | |
JP2000174146A (en) | Method of testing rewrite stress of nonvolatile semiconductor memory |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20030520 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
RBV | Designated contracting states (corrected) |
Designated state(s): DE GB |
|
17Q | First examination report despatched |
Effective date: 20070806 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SPANSION, INC |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SPANSION LLC |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RTI1 | Title (correction) |
Free format text: METHOD FOR DUAL BIT MEMORY ERASE VERIFICATION |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE GB |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 60143125 Country of ref document: DE Date of ref document: 20101104 Kind code of ref document: P |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20110623 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 60143125 Country of ref document: DE Effective date: 20110623 |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: 732E Free format text: REGISTERED BETWEEN 20150618 AND 20150624 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 60143125 Country of ref document: DE Representative=s name: MURGITROYD & COMPANY, DE Ref country code: DE Ref legal event code: R081 Ref document number: 60143125 Country of ref document: DE Owner name: CYPRESS SEMICONDUCTOR CORP. (N.D.GES.D.STAATES, US Free format text: FORMER OWNER: SPANSION LLC, SUNNYVALE, CALIF., US |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20150928 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20150929 Year of fee payment: 15 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 60143125 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20160807 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170301 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20160807 |